作者
Guangjie Han, Jinfang Jiang, Lei Shu, Jianwei Niu, Han-Chieh Chao
发表日期
2014/5/1
期刊
Journal of Computer and System Sciences
卷号
80
期号
3
页码范围
602-617
出版商
Academic Press
简介
Wireless Sensors Networks (WSNs) are susceptible to many security threats, and because of communication, computation and delay constraints of WSNs, traditional security mechanisms cannot be used. Trust management models have been recently suggested as an effective security mechanism for WSNs. Considerable research has been done on modeling and managing trust. In this paper, we present a detailed survey on various trust models that are geared towards WSNs. Then, we analyze various applications of trust models. They are malicious attack detection, secure routing, secure data aggregation, secure localization and secure node selection. In addition, we categorize various types of malicious attacks against trust models and analyze whether the existing trust models can resist these attacks or not. Finally, based on all the analysis and comparisons, we list several trust best practices that are essential …
引用总数
2013201420152016201720182019202020212022202320241154838435239312624147
学术搜索中的文章
G Han, J Jiang, L Shu, J Niu, HC Chao - Journal of Computer and System Sciences, 2014